Foundations of Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

This set of vocabulary flashcards is designed to help students understand key terms and concepts in the field of cybersecurity.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Cybersecurity

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

2
New cards

Threat Actor

Any person or group who presents a security risk.

3
New cards

Phishing

The use of digital communication to trick people into revealing sensitive data or deploying malicious software.

4
New cards

Security Posture

An organization's ability to manage its defense of critical assets and data, and react to change.

5
New cards

Business Continuity

An organization's ability to maintain their everyday productivity by establishing risk disaster recovery plans.

6
New cards

PII

Personally Identifiable Information.

7
New cards

SPII

Sensitive Personally Identifiable Information.

8
New cards

Risk Mitigation

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.

9
New cards

Security Frameworks

Guidelines used for building plans to help mitigate risks and threats to data and privacy.

10
New cards

CIA Triad

A foundational model that helps inform how organizations consider risk when setting up systems and security policies, consisting of Confidentiality, Integrity, and Availability.

11
New cards

Asset Security

Secures digital and physical assets and involves managing the storage, maintenance, retention, and destruction of data.

12
New cards

Incident Response

The process of handling and managing the aftermath of a security breach or cyberattack.

13
New cards

Vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

14
New cards

Ransomware

A malicious attack where threat actors encrypt an organization's data and demand payment to restore access.

15
New cards

Network Security

The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.

16
New cards

Social Engineering

A manipulation technique that exploits human error to gain private information or access.

17
New cards

Encryption

The process of converting data from a readable format to an encoded format to ensure confidentiality.

18
New cards

Compliance

The process of adhering to internal standards and external regulations.

19
New cards

Playbook

A manual that provides details about operational actions, such as how to respond to cybersecurity incidents.

20
New cards

Audit

A review of an organization's security controls, policies, and procedures against a set of expectations.